bars
⌨️
Penetration testing & ethical hacking concepts
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
Methodology
Post exploitation/priviesc
1
hashtag
User privileges
id
, sudo, etc.
2
hashtag
SUID/SGID bit
3
hashtag
File permissions
4
hashtag
Environment variables
5
hashtag
Cronjobs
6
hashtag
Kernel exploit
7
hashtag
Automated tools
winpeas, linpeas, etc.
Previous
Exploitation/initial access
chevron-left
Next
What are attacks on routing protocols?
chevron-right
Last updated
3 months ago
User privileges
SUID/SGID bit
File permissions
Environment variables
Cronjobs
Kernel exploit
Automated tools
sun-bright
desktop
moon
sun-bright
desktop
moon